You are on page 1of 13

Third-generation

Sandboxing
Delivers AI-based
Breach Prevention
Table of Contents

Executive Overview 3

Outdated Sandboxes Leave Organizations


Vulnerable to Breaches 4

What Makes for a Third-generation Sandbox? 5

Security Effectiveness 5

Simplified Operations 8

Scalability 10

Cost Controls 10

AI-based Security Designed for the Evolving


Threat Landscape 12
Executive Overview
As a result of a rapidly evolving threat landscape, breach frequency has grown by two-thirds while the total cost of
cyber crime per company increased by 72% over the last five years.1 Malware now employs advanced tactics like
polymorphism and artificial intelligence (AI) to avoid detection by outdated security tools—such as previous-generation
sandbox devices. In order to prevent data breaches resulting from unknown threats, organizations must reevaluate
their approach to sandboxing. The answer is third-generation sandbox solutions, which can support automated
defenses across an organization through security integration, real-time threat-intelligence sharing, advanced AI
capabilities featuring static and behavior analysis, as well as a common security language that simplifies management
and reporting functions.

3
Outdated Sandboxes Leave comprehensive threat-intelligence sharing, which inhibits real-
time, automated responses to threats across the organization.
Organizations Vulnerable to
Breaches When this is coupled with the fact that security architects must
take measures to thwart zero-day and other unknown attacks
Each day, the threat landscape expands in terms of the number to prevent breaches before they occur, the challenge becomes
of unique attacks and the sophistication with which they execute even greater. In that pursuit, security architects should
their objectives. As evidence, the average cost of a data breach implement a third-generation sandbox solution that
last year grew to $3.92 million. This was due in no small part to delivers advanced AI capabilities as well as integration
with their organization’s broader security architecture.
the fact that it takes an average of 279 days to identify and contain
a successful attack.2 Today’s latest generation of polymorphic
malware utilizes AI to spontaneously create new, customized
attacks.3 On any given day, up to 40% of new malware is
now zero day or previously unknown,4 making it that much Sandbox Evolution
harder for security systems to detect and repel attacks.

The limitations of outdated security solutions (including


Sandbox Evolution
first- and even second-generation sandboxing devices) §§First-generation sandboxes were stand-alone
physical devices used to identify advanced threats.
to cover every new risk have forced many security
architects to patch defenses with an assortment of point §§Second-generation sandboxes integrate with other
devices across the broader security architecture to
security products from different vendors. As a result, detect advanced threats across an organization.
security teams must learn multiple nonstandard security §§Third-generation sandboxes now also include
languages and adopt manual workflows for management robust AI capabilities that can perform both static
and reporting functions—not to mention manage and behavior analysis.
multiple security consoles. This complexity typically lacks

4
What Makes for a Third-generation Sandbox?
Despite the fact that their protections may be out of date and extremely limited, there is still a wide variety of first- and second-
generation sandboxes on the market. It can be very difficult for security architects to tell the difference. In essence, an
effective third-generation sandboxing solution must include three critical capabilities:
§§It must address the evolving threat landscape by leveraging AI that performs both static and dynamic analysis to
improve detection efficacy of zero-day threats even further.
§§It must utilize a standardized framework that categorizes all malware techniques in an easy-to-read matrix as part of the
reporting in a universal security language (such as the MITRE ATT&CK framework).
§§It must be able to share threat intelligence across a fully integrated security architecture and offer automated
breach-protection responses—a requisite for combating zero-day threats in real time.

Beyond those third-generation qualifiers, security architects should evaluate the effectiveness of a sandboxing solution in
five areas.

Security Effectiveness
A sandbox’s response time to any security event must be instantaneous in order to minimize risk exposure. In this case,
evaluation of a solution should be based not only on its effective threat-detection rate but also on the time-to-detect
metrics that directly impact return on investment (ROI) for enterprises.5 Faster identification of threats and containment of
breaches yield lower recovery costs.

5
A sandbox’s ability to block and report
on successful infections in a timely
manner is critical to maintaining
the security and functionality of the
monitored network.6

6
Far too often, organizations must choose between §§Advanced AI analysis. Most sandboxes on the market
a security solution’s ability to keep the network safe today lack any AI capabilities at all. Even in cases where
and the network’s ability to support high-performance a sandbox may claim to use AI, it may only be able to
throughput of traffic. But a balance of both is necessary perform static analysis. But an effective, truly AI-enabled
sandboxing solution must be able to apply both static and
for today’s evolving infrastructure. A sandbox’s security
dynamic analysis to expose indicators of compromise
effectiveness should be evaluated within the context of
(IOCs) during malware execution to spot both known
its performance and vice versa.7 It also needs to apply and new behaviors. And as a new behavior appears with
threat intelligence from global research, locally shared greater frequency, AI analysis can automatically track and
contextual awareness, and (most importantly) its own AI- promote its relevancy as a critical security concern.
enabled analytical tools to expose unknown threats. §§Detection + prevention. Detecting an effective malware
intrusion should happen quickly and accurately to help
With all this in mind, organizations need to look for
administrators contain the infection and minimize impact
sandboxes with recommended ratings from third-party
on the network.8 But security architects need to look for
testing organizations (e.g., NSS Labs) for security a sandbox that supports breach prevention as well as
effectiveness and time to detect. As such, to gauge the detection capabilities. Previous-generation sandboxing
effectiveness of a potential sandbox acquisition, security solutions provide threat detection. But to help reduce the
architects should consider: number and cost of breaches, sandboxes must also now
help prevent breaches before they occur. A sandbox’s
§§Integration. The sandbox should be connected to
preventative ability to block and report potential threats in
other security solutions across the organization’s
a timely manner is now critical.
broader defensive architecture for better visibility and
§§Homegrown technologies. The most effective
manageability. Sandbox integration also unlocks its
sandboxing solutions available tend to be based on
ability to instantly share threat information in support
original technologies developed in-house. These
of automated threat-mitigation responses across the companies typically keep their products up to date, fully
organization’s extended security ecosystem. This in patched, and armed with the latest and best features
turn can help prevent breaches from occurring. for the current state of the threat landscape.

7
Simplified Operations §§Automated malware reporting. An integrated
approach to sandboxing supports reporting in a
More than half (57%) of CISOs named “too many manual universal security language by using a unified framework
processes” as a top challenge—followed by “missed for categorizing all malware techniques in an easy-to-
malware and attacks.”9 Previous-generation sandboxes read matrix. This simplifies security management while
typically require more manual administration, which adds obviating the need for manual processes—namely,
to the strain on limited security team resources. However, investigation and translation of alerts and contextual
at the same time, a majority (65%) of organizations report information surrounding an incident into actionable
a shortage of cybersecurity staff.10 Beyond the ongoing threat-mitigation processes. One such universal
skills shortage, security leaders also typically face tight language is the MITRE ATT&CK—a globally accessible
budgetary constraints, which limits their ability to scale knowledge base of adversary tactics and techniques
resources as needed. based on real-world observations with broad adoption
in the private sector, in government, and in the
§§Automated security management. An integrated
cybersecurity product and service community.11
sandbox that shares zero-day intelligence to other
in-line security controls enables automatic protection
across the network. This robust security automation CISOs name “too many manual processes”
helps to eliminate manual processes—which eases and “missed malware attacks” as their top
the burden on human staff while improving security security challenges.
and reducing operating expenses (OpEx).

8
38%
of organizations are currently taking
effective advantage of automation,
artificial intelligence, and machine
learning—which exposes them to
advanced threats that traditional
security models cannot address. 12

9
Scalability Cost Controls
A third-generation sandbox should support scaling Many sandbox solutions require multiple devices and/or
to accommodate increasing traffic and infrastructural subscriptions, which lead to a high total cost of ownership
changes that result from digital innovation adoption. (TCO). Following are key areas of consideration:
It should offer ample performance capacity, flexible §§Consolidated protection. A third-generation
licensing, and multiple deployment options. Core sandbox should cover the entire attack surface
capabilities include: (network, endpoints, web, email, and cloud) without
§§Clustering. Security architects should look for additional licenses and costs. It also should be able
a solution that supports clustering—including a to integrate with other critical solutions across the
sufficient number of nodes per cluster to support security ecosystem—such as a next-generation
network growth, increasing traffic demands, and firewall (NGFW)—to uncover attacks that may
expanding security needs in the future. be hiding in secure sockets layer (SSL)/transport
§§Deployment. Sandboxing solutions that go beyond layer security (TLS) encrypted traffic. Sandboxes
“on-premises only” form factors—including virtual without this sort of security integration may require
machine (VM) and cloud-based options—provide the purchase of separate devices for encryption/
flexibility for where and how sandboxing can be decryption capabilities—increasing capital expenses
deployed. For example, a cloud-based sandbox form (CapEx) and operational complexity.
factor can leverage the elastic nature of Infrastructure- §§Cost per protected Mbps. Cost remains a concern
as-a-Service (IaaS) for greater operational scalability for most organizations, and sandboxes need to
across distributed infrastructures. reduce cost per protected Mbps (as measured by
third-party testing organizations like NSS Labs) and
eliminate supplemental subscription costs.

10
Implementation of sandboxing
can be complex, with numerous
factors impacting the overall cost
of deployment, maintenance,
and upkeep.13

11
AI-based Security Designed for the Evolving Threat Landscape
As sophisticated AI-based malware variants continue to multiply and the risk of zero-day threats increases the likelihood of
a breach, organizations must consider replacing outdated sandboxes with a solution designed for today’s threat landscape.
An integrated, third-generation sandbox offers security leaders the ability to both detect and prevent breaches through
better security effectiveness, manageability, scalability, and cost.

1
“The Cost of Cybercrime: Ninth Annual Cost of Cybercrime Study,” Accenture and Ponemon Institute, March 6, 2019.

2
“2019 Cost of a Data Breach Report,” Ponemon Institute and IBM Security, July 2019.

3
“AI-driven Cyber Crime Brings New Challenges to CISOs: Too Fast, Too Agile, Too Dangerous for Traditional Security Approaches,” Fortinet, June 21, 2019.

4
According to internal data from FortiGuard Labs.

5
“NSS Labs Announces 2018 Breach Detection Systems Group Test Results,” NSS Labs, October 11, 2018.

6
Jessica Williams, et al., “Breach Prevention Systems Test Report,” NSS Labs, August 7, 2019.

7
Ibid.

8
Ibid.

9
“The CISO and Cybersecurity: A Report on Current Priorities and Challenges,” Fortinet, April 26, 2019.

10
“Strategies for Building and Growing Strong Cybersecurity Teams: (ISC)2 Cybersecurity Workforce Study, 2019,” (ISC)2, 2019.

11
“MITRE ATT&CK,” MITRE, accessed November 25, 2019.

12
“The Cost of Cybercrime: Ninth Annual Cost of Cybercrime Study,” Accenture and Ponemon Institute, March 6, 2019.

13
Jessica Williams, et al., “Breach Prevention Systems Test Report,” NSS Labs, August 7, 2019.

12
www.fortinet.com

Copyright © 2019 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company
names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect
performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the
identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in
the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current
version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the
publication shall be applicable.

483924-0-0-EN
December 4, 2019 4:23 AM
eb-third-generation-sandboxing-delivers-ai-based-breach-prevention-v1.2

You might also like